-
🔭 Currently pursuing a MSc from Stevens Institute of Technology with focus on AI/ML.
-
🌱 I'm working on V2 of my Portfolio, attending Hackathons && generally thinking about solutions to problems that I can build.
-
🤝 Always down for new project opportunities || to collaborate on OSS.
-
PFP is my face when the question warrants an "It depends..."; which is basically all of the time because we are always balancing tradeoffs. ⚖️
-
👨💻 All of my projects are available either in Github or Code Pen - soon it will be available in one place (my portfolio site).
-
📝 I will be adding a Technical blog to my site for my regularly written articles (coming soon)...
-
💬 Ask me about Software Engineering🚀 && CyberSecurity👾
-
📫 How to reach me and also see my experience? Linkedin
Core Competencies
- Cloud (AWS | GCP)
- SIEM & Threat Detection (Splunk | ELK | Wazuh)
- Network Defense & Firewall Management (pfSense & Snort)
- Incident Response & Digital Forensics
- Security Automation (Python, Bash, Powershell)
- Identity & Access Management (IAM, MFA)
Skills: GPG, Bash
This script will encrypt/decrypt a file of your choosing from the directory you're running the script in.
Key Achievements:
- Encrypt/Decrypt Files in current directory
Tools: GPG, Bash Shell
Skills: Network IP Configuration, Server Management, SSH Congifuration
Created a Linux cluster of servers with ssh connection to each other while having independent internet access; all controlled by a master node.
Key Achievements:
- Deployed 3 Ubuntu Servers in a network cluster with SSH connection to each other
- 3 Ubuntu servers with independent internet access
- Configured a Master node to control other servers
Tools: Ubuntu Desktop/Server, KVM/QEMU, Bash
3. DevSecOps
Skills: AWS Cloud, Digital Forensics, Threat Analysis, Reporting, Automation, Infrastructure as Code (IaC), Incident Response, Network/Sys admin
Created DevSecOps as a service with tiered offerings. Specifically geared towards retail/ecommerce clients.
Highlights:
- Tier 1: Ideal for Startups and small teams.
- Tier 2: Teams that need to scale or stay in compliance.
- Tier 3: Enterprise Behemoth
Tools: Graylog, SonarQube, Wireshark, AWS EC2, AWS Security Hub, AWS CloudFormation, AWS CloudWatch, Github Actions
Last Updated: November 2025
"There is no such thing as 100% secure." — Cybersecurity Myths & Misconceptions (Spafford Et al. 2023)




